Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their responsibilities and accountabilities in this respect.Design/Methodology/Approach – The research methodology is desk research. In other words, we gathered facts and existing research publications that helped us to define key terms, to formulate arguments to convince BoDs of the need to secure their intellectual capital, and to outline actions to be taken by BoDs to do so.Findings – Intellectual capital, as a valuable business resource, is related to information, knowledge and cyber security. Hence,...
Treball Final de Grau en Administració d'Empreses. Codi: AE1049. Curs: 2015/2016The interest by the...
Today’s companies are dependent on intangible assets consisting of informations, knowledge, innovati...
Researchers develop the conception of intellectual security by relating the introductory understandi...
Purpose – To position the preservation and protection of intellectual capital as a cyber security co...
Purpose – To investigate the links between IC and the protection of data, information and knowledge ...
Purpose: The purpose of this paper is to frame organisational cybersecurity through a strategic lens...
In the present century, intellectual capital is recognized as the most important and strategic asset...
Today, many organizations recognize the importance of intellectual capital models as a principal dri...
This article analyses the growth and practice of intellectual capital and competitive intelligence, ...
Summary / Abstract Intellectual Capital In the last decade, when entering the knowledge-era, new iss...
Companies devote most of their time on the analysis and accounting of tangible assets, but there are...
Purpose: To investigate the links between IC and the protection of data, information and knowledg...
Nowadays the value of modern companies is mainly created by intellectual capital. Paper analyses di...
none3siPurpose: Reflecting on Big Data’s assumed benefits, this study aims to identify the risks and...
Managers of information systems have ethical, moral and legal obligations to protect their organizat...
Treball Final de Grau en Administració d'Empreses. Codi: AE1049. Curs: 2015/2016The interest by the...
Today’s companies are dependent on intangible assets consisting of informations, knowledge, innovati...
Researchers develop the conception of intellectual security by relating the introductory understandi...
Purpose – To position the preservation and protection of intellectual capital as a cyber security co...
Purpose – To investigate the links between IC and the protection of data, information and knowledge ...
Purpose: The purpose of this paper is to frame organisational cybersecurity through a strategic lens...
In the present century, intellectual capital is recognized as the most important and strategic asset...
Today, many organizations recognize the importance of intellectual capital models as a principal dri...
This article analyses the growth and practice of intellectual capital and competitive intelligence, ...
Summary / Abstract Intellectual Capital In the last decade, when entering the knowledge-era, new iss...
Companies devote most of their time on the analysis and accounting of tangible assets, but there are...
Purpose: To investigate the links between IC and the protection of data, information and knowledg...
Nowadays the value of modern companies is mainly created by intellectual capital. Paper analyses di...
none3siPurpose: Reflecting on Big Data’s assumed benefits, this study aims to identify the risks and...
Managers of information systems have ethical, moral and legal obligations to protect their organizat...
Treball Final de Grau en Administració d'Empreses. Codi: AE1049. Curs: 2015/2016The interest by the...
Today’s companies are dependent on intangible assets consisting of informations, knowledge, innovati...
Researchers develop the conception of intellectual security by relating the introductory understandi...